Sciweavers

2237 search results - page 419 / 448
» Analysis and Testing of Web Applications
Sort
View
INFOCOM
2009
IEEE
15 years 5 months ago
Packet Classification Algorithms: From Theory to Practice
—During the past decade, the packet classification problem has been widely studied to accelerate network applications such as access control, traffic engineering and intrusion de...
Yaxuan Qi, Lianghong Xu, Baohua Yang, Yibo Xue, Ju...
CIVR
2007
Springer
192views Image Analysis» more  CIVR 2007»
15 years 5 months ago
Texture retrieval based on a non-parametric measure for multivariate distributions
In the present study, an efficient strategy for retrieving texture images from large texture databases is introduced and studied within a distributional-statistical framework. Our...
Vasileios K. Pothos, Christos Theoharatos, George ...
PLDI
1994
ACM
15 years 3 months ago
Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses
As microprocessor speeds increase, memory bandwidth is increasing y the performance bottleneck for microprocessors. This has occurred because innovation and technological improvem...
Jack W. Davidson, Sanjay Jinturkar
CCS
2008
ACM
15 years 1 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...
92
Voted
ICASSP
2010
IEEE
14 years 11 months ago
Hiding information inside structured shapes
This paper describes a new technique for embedding a message within structured shapes. It is desired that my changes in the shape owing to the embedded message are invisible to a ...
Samarjit Das, Shantanu Rane, Anthony Vetro